What type of port scan is shown below?

What type of port scan is shown below? A . Idle ScanB . FIN ScanC . XMAS ScanD . Windows ScanView AnswerAnswer: B

January 20, 2021 No Comments READ MORE +

What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected?

What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected? A . nc -port 56 -s cmd.exeB . nc -p 56 -p -e shell.exeC . nc -r 56 -c cmd.exeD . nc -L 56 -t -e cmd.exeView AnswerAnswer: D

January 20, 2021 No Comments READ MORE +

In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?

In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?A . DesignB . EliminationC . IncorporationD . ReplicationE . LaunchF . DetectionView AnswerAnswer: E

January 20, 2021 No Comments READ MORE +

Which statement correctly defines this term?

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to processB . Providers can increase the bandwidth on critical connections to prevent...

January 20, 2021 No Comments READ MORE +

What technique was used by the Kiley Innovators employee to send information to the rival marketing company?

Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing...

January 19, 2021 No Comments READ MORE +

How can she accomplish this?

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?A . Jayden can use the commanB . ip binding set.C . Jayden can use the commanD . no ip spoofing.E . She should...

January 19, 2021 No Comments READ MORE +

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.

This attack technique is used when a Web application is vulnerable to an SQL Injection but the results of the Injection are not visible to the attacker.A . Unique SQL InjectionB . Blind SQL InjectionC . Generic SQL InjectionD . Double SQL InjectionView AnswerAnswer: B

January 19, 2021 No Comments READ MORE +

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?

Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?A . Configure Port Security on the switchB . Configure Port Recon on the switchC . Configure Switch MappingD . Configure Multiple Recognition on the switchView AnswerAnswer: A

January 19, 2021 No Comments READ MORE +

How do you protect your network against SYN Flood attacks?

The SYN flood attack sends TCP connections requests faster than a machine can process them. ✑ Attacker creates a random source address for each packet ✑ SYN flag set in each packet is a request to open a new connection to the server from the spoofed IP address ✑ Victim...

January 19, 2021 No Comments READ MORE +

URL: http://www.certified.com/search.pl?

Consider the following code: URL: http://www.certified.com/search.pl? text=<script>alert(document.cookie)</script> If an attacker can trick a victim user to click a link like this, and the Web application does not validate input, then the victim's browser will pop up an alert showing the users current set of cookies. An attacker can do much...

January 19, 2021 No Comments READ MORE +